Free 102-500 Sample Questions — LPI Level 1

Free 102-500 sample questions for the LPI Level 1 exam. No account required: study at your own pace.

Want an interactive quiz? Take the full 102-500 practice test

Looking for more? Click here to get the full PDF with 117+ practice questions for $10 for offline study and deeper preparation.

Question 1

If neither cron.allow nor cron.deny exist in /etc/, which of the following is true?

  • A. Without additional configuration, all users may create user specific crontabs
  • B. Without additional configuration, only root may create user specific crontabs
  • C. The cron daemon will refuse to start and report missing files in the system's logfile
  • D. When a user creates a user specific crontab the system administrator must approve it explicitly
  • E. The default settings of /etc/crond.conf define whether or not user specific crontabs are generally allowed or not
Show Answer
Correct Answer:
B. Without additional configuration, only root may create user specific crontabs
Question 2

Which of the following commands sets the system's time zone to the Canadian Eastern Time?

  • A. localegen -t -f /usr/share/zoneinfo/Canada/Eastern > /etc/locate.tz
  • B. tzconf /etc/localtime
  • C. sysctl -w clock.tz='Canada/Eastern'
  • D. modprobe tz_ca_est
  • E. ln -sf /usr/share/zoneinfo/Canada/Eastern /etc/localtime
Show Answer
Correct Answer:
E. ln -sf /usr/share/zoneinfo/Canada/Eastern /etc/localtime
Question 3

Which of the following protocols is designed to access the video card output of a virtual machine?

  • A. KDE
  • B. X11
  • C. Xfce
  • D. SPICE
  • E. XDMCP
Show Answer
Correct Answer:
D. SPICE
Question 4

Why is the correct configuration of a system's time zone important?

  • A. Because the timezone is included in checksum calculations and timezone changes invalidate existing checksums
  • B. Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created
  • C. Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone
  • D. Because NTP chooses servers nearby based on the configured time zone
  • E. Because the conversion of Unix timestamps to local time relies on the time zone configuration
Show Answer
Correct Answer:
E. Because the conversion of Unix timestamps to local time relies on the time zone configuration
Question 5

Which of the following steps prevents a user from obtaining an interactive login session?

  • A. Setting the UID for the user to 0
  • B. Running the command chsh -s /bin/false with the user name
  • C. Removing the user from the group staff
  • D. Adding the user to /etc/noaccess
  • E. Creating a .nologin file in the user's home directory
Show Answer
Correct Answer:
B. Running the command chsh -s /bin/false with the user name
Question 6

Which of the following is true about IPv6?

  • A. IPv6 no longer supports broadcast addresses
  • B. With IPv6, the TCP port numbers of most services have changed
  • C. IPv4 addresses can be used without any change with IPv6
  • D. IPv6 no longer supports multicast addresses
  • E. For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP
Show Answer
Correct Answer:
A. IPv6 no longer supports broadcast addresses
Question 7

Which of the following comparison operators for test work on elements in the file system? (Choose two.)

  • A. -z
  • B. -eq
  • C. -d
  • D. -f
  • E. -lt
Show Answer
Correct Answer:
  • C. -d
  • D. -f
Question 8

Which of the following commands displays all environment and shell variables?

  • A. getargs
  • B. lsenv
  • C. ls
  • D. env
  • E. lsshell
Show Answer
Correct Answer:
D. env
Question 9

What is a purpose of an SSH host key?

  • A. It must be sent by any SSH client in addition to a user key in order to identify the client's host
  • B. It is root key by which all user SSH keys must be signed
  • C. It provides the server's identity information to connecting SSH clients
  • D. It authenticates any user that logs into a remote machine from the key's host
  • E. It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts
Show Answer
Correct Answer:
C. It provides the server's identity information to connecting SSH clients
Question 10

What output is produced by the following command sequence? echo '1 2 3 4 5 6' | while read a b c; do echo result $c $b $a; done

  • A. result: 6 5 4
  • B. result: 1 2 3 4 5 6
  • C. result: 3 4 5 6 2 1
  • D. result: 6 5 4 3 2 1
  • E. result: 3 2 1
Show Answer
Correct Answer:
C. result: 3 4 5 6 2 1
Question 11

Which option in the chrony configuration file changes the initial interval of polls to a NTP server in order to speed up the initial synchronization?

  • A. iburst
  • B. quickstart
  • C. fast
  • D. fsync
  • E. flood
Show Answer
Correct Answer:
A. iburst
Question 12

Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose three.)

  • A. 10.0.0.0/8
  • B. 127.0.0.0/8
  • C. 169.255.0.0/16
  • D. 172.16.0.0/12
  • E. 192.168.0.0/16
Show Answer
Correct Answer:
  • A. 10.0.0.0/8
  • D. 172.16.0.0/12
  • E. 192.168.0.0/16
Question 13

What is true regarding public and private SSH keys? (Choose two.)

  • A. For each user account, there is exactly one key pair that can be used to log into that account
  • B. The private key must never be revealed to anyone
  • C. Several different public keys may be generated for the same private key
  • D. To maintain the private key's confidentiality, the SSH key pair must be created by its owner
  • E. To allow remote logins, the user's private key must be copied to the remote server
Show Answer
Correct Answer:
  • B. The private key must never be revealed to anyone
  • D. To maintain the private key's confidentiality, the SSH key pair must be created by its owner
Question 14

Which of the following tasks can the date command accomplish? (Choose two.)

  • A. Set the system's date and time
  • B. Set the system's date but not the time
  • C. Calculate the time span between two dates
  • D. Print a calendar for a month or a year
  • E. Display time in a specific format
Show Answer
Correct Answer:
  • A. Set the system's date and time
  • E. Display time in a specific format
Question 15

Which of the following commands finds all files owned by root that have the SetUID bit set?

  • A. find / -user root -perm -4000
  • B. find / -user 0 -mode +s
  • C. find / -owner root -setuid
  • D. find / -owner 0 -permbits 0x100000000
  • E. find / --filter uid=1 --filter pers=u+s
Show Answer
Correct Answer:
A. find / -user root -perm -4000
Question 16

Which of the following configuration files should be modified to globally set shell variables for all users?

  • A. /etc/profile
  • B. /etc/bashrc
  • C. ~/.bash_profile
  • D. /etc/.bashrc
  • E. /etc/shellenv
Show Answer
Correct Answer:
A. /etc/profile
Question 17

What information related to a user account is modified using the chage command?

  • A. Default ownership for new files
  • B. Group membership
  • C. Set of commands available to the user
  • D. Password expiry information
  • E. Default permissions for new files
Show Answer
Correct Answer:
D. Password expiry information
Question 18

Which of the following parameters are used for journalctl to limit the time frame of the output? (Choose two.)

  • A. --since=
  • B. --from=
  • C. --until=
  • D. --upto=
  • E. --date=
Show Answer
Correct Answer:
  • A. --since=
  • C. --until=
Question 19

Which of the following commands shows all active systemd timers?

  • A. systemctl-timer show
  • B. timectl list
  • C. systemctl ""t
  • D. systemctl list-timers
  • E. timeq
Show Answer
Correct Answer:
D. systemctl list-timers
Question 20

After editing the TCP wrapper configuration to grant specific hosts access to a service, when do these changes become effective?

  • A. The new configuration becomes effective after restarting the respective service
  • B. The new configuration becomes effective at the next system reboot
  • C. The new configuration becomes effective when the last established connection to the service is closed
  • D. The new configuration becomes effective after restarting the tcpd service
  • E. The new configuration becomes effective immediately for all new connections
Show Answer
Correct Answer:
E. The new configuration becomes effective immediately for all new connections

Aced these? Get the Full Exam

Download the complete 102-500 study bundle with 117+ questions in a single printable PDF.